Strict Standards: call_user_func_array() expects parameter 1 to be a valid callback, non-static method Anderson_Makiyama_Captcha_On_Login::check_blocked_ips_befor_all() should not be called statically in /home/ecenterp/public_html/blog/wp-includes/class-wp-hook.php on line 286

Notice: register_sidebar was called incorrectly. No id was set in the arguments array for the "Sidebar" sidebar. Defaulting to "sidebar-1". Manually set the id to "sidebar-1" to silence this notice and keep existing sidebar content. Please see Debugging in WordPress for more information. (This message was added in version 4.2.0.) in /home/ecenterp/public_html/blog/wp-includes/functions.php on line 4147

Notice: add_custom_background is deprecated since version 3.4.0! Use add_theme_support( 'custom-background', $args ) instead. in /home/ecenterp/public_html/blog/wp-includes/functions.php on line 3839

Notice: add_custom_image_header is deprecated since version 3.4.0! Use add_theme_support( 'custom-header', $args ) instead. in /home/ecenterp/public_html/blog/wp-includes/functions.php on line 3839

Notice: get_current_theme is deprecated since version 3.4.0! Use wp_get_theme() instead. in /home/ecenterp/public_html/blog/wp-includes/functions.php on line 3839

Notice: get_theme is deprecated since version 3.4.0! Use wp_get_theme( $stylesheet ) instead. in /home/ecenterp/public_html/blog/wp-includes/functions.php on line 3839

Notice: get_themes is deprecated since version 3.4.0! Use wp_get_themes() instead. in /home/ecenterp/public_html/blog/wp-includes/functions.php on line 3839

Notice: wp_register_style was called incorrectly. Scripts and styles should not be registered or enqueued until the wp_enqueue_scripts, admin_enqueue_scripts, or login_enqueue_scripts hooks. Please see Debugging in WordPress for more information. (This message was added in version 3.3.0.) in /home/ecenterp/public_html/blog/wp-includes/functions.php on line 4147

Notice: wp_enqueue_style was called incorrectly. Scripts and styles should not be registered or enqueued until the wp_enqueue_scripts, admin_enqueue_scripts, or login_enqueue_scripts hooks. Please see Debugging in WordPress for more information. (This message was added in version 3.3.0.) in /home/ecenterp/public_html/blog/wp-includes/functions.php on line 4147

Notice: wp_register_style was called incorrectly. Scripts and styles should not be registered or enqueued until the wp_enqueue_scripts, admin_enqueue_scripts, or login_enqueue_scripts hooks. Please see Debugging in WordPress for more information. (This message was added in version 3.3.0.) in /home/ecenterp/public_html/blog/wp-includes/functions.php on line 4147

Notice: wp_enqueue_style was called incorrectly. Scripts and styles should not be registered or enqueued until the wp_enqueue_scripts, admin_enqueue_scripts, or login_enqueue_scripts hooks. Please see Debugging in WordPress for more information. (This message was added in version 3.3.0.) in /home/ecenterp/public_html/blog/wp-includes/functions.php on line 4147

Notice: Undefined index: aiosp_cpostactive in /home/ecenterp/public_html/blog/wp-content/plugins/all-in-one-seo-pack/aioseop_class.php on line 1393
January, 2011 | Ecenterpk.com
Notice: Undefined index: aiosp_cpostactive in /home/ecenterp/public_html/blog/wp-content/plugins/all-in-one-seo-pack/aioseop_class.php on line 1393

Ecenterpk.com Education Center Pakistan

22Jan/111

Headmaster suspended for harassing female teacher

RAWALPINDI: The headmaster of a government primary boys` school was suspended on Friday over the allegations of sexually harassing a female teacher that he hired for his school without approval of the department, Dawn has learnt. “I have verbally been informed about the alleged incident and suspended the headmaster. I have also directed deputy district officer schools to hold an inquiry into the incident and if charges were found true, strict disciplinary action should be taken against the accused,” said Executive District Officer Education Qazi Zahoorul Haq. “The school heads are not authorised to hire the services of any person for teaching without the proper approval and notice of the district education department and in case of such hiring the headmaster has to face further action,” the EDO said. The teacher (FB) in her complaint to Civil Lines DSP Office alleged that Jahangir, headmaster of Government Boys Primary School Dhoke Munshi near Gharibabad locality tried to sexually assault her on December 23. She said she resisted his attempt and later left the school. “On December 23 Jahangir asked her to stay after the pack-up time as she had to check some notebooks of the students. When she was going through the notebooks the headmaster tried to assault her,” the female teacher who lived in Dhoke Munshi with her mother and younger brother said. In her complaint submitted on December 27 the teacher said she was initially discouraged by her mother from informing the police but she could not tolerate the attitude of the headmaster. There were two female teachers hired by Jahangir on a salary of Rs2,000, and the school administration collected Rs20 from every student for their salaries, the complainant said. On the other hand, Jahangir claimed: “I am absolutely innocent and the allegations against me are baseless. I ousted FB from the school in November as she used to meet a stranger in the school hours and there were complaints by her mother that she came home late.” “My other teachers advised me to sack FB as they could face problems owing to her attitude. As I ousted her, she became annoyed and threatened me of dire consequences,” said the headmaster. He, however, insisted that the heads of the government schools were authorised to hire the services of teachers on daily basis to make up the shortage of regular teachers. When contacted Airport Police Station House Officer Chaudhry Khalid said his office received the complaint on Thursday from the office of DSP Civil Lines Office. He said he summoned the complainant but she was not cooperating. The SHO said in his initial statement Jahangir denied the charges and the situation could become clear only after the statement of the complainant. He said Jahangir appeared before the DSP Civil Lines on January 1 and refuted the allegations.Dawn.

21Jan/110

TWO MEN CHARGED IN NEW JERSEY WITH HACKING AT&T’S SERVERS

United States Attorney
District of New Jersey
FOR IMMEDIATE RELEASE                      CONTACT:  Rebekah Carmichael
January 18, 2011                    Office of Public Affairs
www.justice.gov/usao/nj                    (973) 645-2888
TWO MEN CHARGED IN NEW JERSEY WITH HACKING AT&T’S SERVERS
Defendants Allegedly Stole E-mail Addresses and Personal Information
Belonging to 120,000 Apple iPad 3G Subscribers
NEWARK, N.J. – Two self-described Internet “trolls” were arrested today for allegedly
hacking AT&T’s servers and stealing e-mail addresses and other personal information belonging
to approximately 120,000 Apple iPad users who accessed the Internet via AT&T’s 3G network,
United States Attorney Paul J. Fishman announced.
Andrew Auernheimer, 25, of Fayetteville, Ark., and Daniel Spitler, 26, of San Francisco,
Calif., were taken into custody this morning by special agents of the FBI – each charged with an
alleged conspiracy to hack AT&T’s servers and for possession of personal subscriber information
obtained from the servers.  Auernheimer was arrested in Fayetteville while appearing in Arkansas
state court on unrelated drug charges, and is expected to appear this afternoon before United
States Magistrate Judge Erin L. Setser in Fayetteville federal court.  Spitler surrendered to FBI
agents in Newark and is expected to appear in Newark federal court before United States
Magistrate Judge Claire C. Cecchi.
According to the Complaint unsealed today:
The iPad is a touch-screen tablet computer, developed and marketed by Apple
Computers, Inc., which allows users to, among other things, access the Internet and send and
receive electronic mail.  Since the introduction of the iPad in January 2010, AT&T has provided
iPad users with Internet connectivity via AT&T’s 3G wireless network.  During the registration
process for subscribing to the network, a user is required to provide an e-mail address, billing
address, and password.
Prior to mid-June 2010, AT&T automatically linked an iPad 3G user’s e-mail address to
the Integrated Circuit Card Identifier (“ICC-ID”), a number unique to the user’s iPad, when he
registered.  As a result, every time a user accessed the AT&T website, his ICC-ID was
recognized and his e-mail address was automatically populated for faster, user-friendly access to
the site.  AT&T kept the ICC-IDs and associated e-mail addresses confidential.
At that time, when an iPad 3G communicated with AT&T’s website, its ICC-ID was
automatically displayed in the Universal Resource Locator, or “URL,” of the AT&T website in
plain text.  Seeing this, and discovering that each ICC-ID was connected to an iPad 3G user email address, hackers wrote a script termed the “iPad 3G Account Slurper”and deployed itagainst AT&T’s servers.
The Account Slurper attacked AT&T’s servers for several days in early June 2010, and
was designed to harvest as many ICC-ID/e-mail address pairings as possible.  It worked by
mimicking the behavior of an iPad 3G so that AT&T’s servers would be fooled into granting the
Account Slurper access.  Once deployed, the Account Slurper used a process known as a “brute
force” attack – an iterative process used to obtain information from a computer system – against
the servers, randomly guessing at ranges of ICC-IDs.  An incorrect guess was met with no
additional information, while a correct guess was rewarded with an ICC-ID/e-mail pairing for a
specific, identifiable iPad 3G user.
From June 5 through June 9, 2010, the Account Slurper stole for its hacker-authors
approximately 120,000 ICC-ID/e-mail address pairings for iPad 3G customers.
Immediately following the theft, the hacker-authors of the Account Slurper provided the
stolen e-mail addresses and ICC-IDs to the website Gawker, which published the stolen
information in redacted form, along with an article concerning the breach.  The article indicated
that the breach “exposed the most exclusive email list on the planet,”and named a number of
famous individuals whose emails had been compromised, including Diane Sawyer, Harvey
Weinstein, Mayor Michael Bloomberg, and Rahm Emanuel.  The article also stated that iPad
users could be vulnerable to spam marketing and malicious hacking.  A group calling itself
“Goatse Security” was identified as obtaining the subscriber data.
According to its website, Goatse Security is a loose association of Internet hackers and
self-professed Internet “trolls” – people who intentionally, and without authorization, disrupt
services and content on the Internet – to which both Spitler and Auernheimer belong.
Auernheimer previously has been outspoken about his trolling activities, bragging to The New
York Times in August 2008: “I hack, I ruin, I make piles of money.”  Auernheimer has also made
Internet video postings taking credit for trolling Amazon.com and causing a “one billion dollar
change in their market capitalization.”
During the data breach, Spitler and Auernheimer communicated with one another using
Internet Relay Chat, an Internet instant messaging program.  Those chats not only demonstrate
that Spitler and Auernheimer were responsible for the data breach, but also that they conducted
the breach to simultaneously damage AT&T and promote themselves and Goatse Security.  As
the data breach continued, so too did the discussions between Spitler, Auernheimer, and other
Goatse Security members about the best way to take advantage of the breach and associated theft.
On June 10, 2010, immediately after going public with the breach, Spitler and Auernheimer
discussed destroying evidence of their crime.
U.S. Attorney Fishman stated: “Hacking is not a competitive sport, and security breaches
are not a game.  Companies that are hacked can suffer significant losses, and their customers
made vulnerable to other crimes, privacy violations, and unwanted contact.  Computer intrusions
-2-and the spread of malicious code are a threat to national security, corporate security, and personal
security.  Those who use technological expertise for malicious purposes take note: your activities
in cyberspace can have serious consequences for you in the real world.”
“One primary principle of our society is confidence in a reasonable expectation of
personal privacy, which includes expectations of financial privacy, medical privacy, and privacy
in our communications,” said Michael B. Ward, Special Agent in Charge of the FBI’s Newark
field office.  “Unauthorized intrusions into personal privacy adversely affect individual citizens,
businesses, and even national security.  Such intrusion cases, regardless if the motive is criminal
gain or prestige among peers in the cyber-hacking world, must and will be aggressively pursued
to ensure these rights are protected to the highest degree.”
Each defendant is charged with one count of conspiracy to access a computer without
authorization and one count of fraud in connection with personal information.  Each count with
which the defendants are charged carries a maximum potential penalty of five years in prison and
a fine of $250,000.
U.S. Attorney Fishman credited special agents of the FBI, under the direction of Special
Agent in Charge Michael B. Ward in Newark, with the investigation leading to the charges.  He
also thanked special agents of the FBI, under the direction of Special Agent in Charge Valerie
Parlave in Little Rock, Ark., and the U.S. Attorney’s Office for the Western District of Arkansas,
under the direction of U.S. Attorney William Conner Eldridge.
The government is represented by Assistant United States Attorneys Lee Vartan and Zach
Intrater of the Computer Hacking and Intellectual Property Section of the United States
Attorney’s Office Economic Crimes Unit.
The charges and allegations contained in the Complaint are merely accusations, and each
defendant is presumed innocent unless and until proven guilty.
11-025 ###
Defense counsel:
Spitler: Susan C. Cassell, Esq., Ridgewood, N.J.
Auernheimer: Candace Hom, Esq., Federal Public Defender, Newark
-3-

United States Attorney District of New Jersey    FOR IMMEDIATE RELEASE                      CONTACT:  Rebekah Carmichael  January 18, 2011                    Office of Public Affairswww.justice.gov/usao/nj                    (973) 645-2888TWO MEN CHARGED IN NEW JERSEY WITH HACKING AT&T’S SERVERSDefendants Allegedly Stole E-mail Addresses and Personal Information Belonging to 120,000 Apple iPad 3G SubscribersNEWARK, N.J. – Two self-described Internet “trolls” were arrested today for allegedlyhacking AT&T’s servers and stealing e-mail addresses and other personal information belongingto approximately 120,000 Apple iPad users who accessed the Internet via AT&T’s 3G network,United States Attorney Paul J. Fishman announced.Andrew Auernheimer, 25, of Fayetteville, Ark., and Daniel Spitler, 26, of San Francisco,Calif., were taken into custody this morning by special agents of the FBI – each charged with analleged conspiracy to hack AT&T’s servers and for possession of personal subscriber informationobtained from the servers.  Auernheimer was arrested in Fayetteville while appearing in Arkansasstate court on unrelated drug charges, and is expected to appear this afternoon before UnitedStates Magistrate Judge Erin L. Setser in Fayetteville federal court.  Spitler surrendered to FBIagents in Newark and is expected to appear in Newark federal court before United StatesMagistrate Judge Claire C. Cecchi.    According to the Complaint unsealed today:The iPad is a touch-screen tablet computer, developed and marketed by AppleComputers, Inc., which allows users to, among other things, access the Internet and send andreceive electronic mail.  Since the introduction of the iPad in January 2010, AT&T has providediPad users with Internet connectivity via AT&T’s 3G wireless network.  During the registrationprocess for subscribing to the network, a user is required to provide an e-mail address, billingaddress, and password.  Prior to mid-June 2010, AT&T automatically linked an iPad 3G user’s e-mail address tothe Integrated Circuit Card Identifier (“ICC-ID”), a number unique to the user’s iPad, when heregistered.  As a result, every time a user accessed the AT&T website, his ICC-ID wasrecognized and his e-mail address was automatically populated for faster, user-friendly access tothe site.  AT&T kept the ICC-IDs and associated e-mail addresses confidential.At that time, when an iPad 3G communicated with AT&T’s website, its ICC-ID wasautomatically displayed in the Universal Resource Locator, or “URL,” of the AT&T website inplain text.  Seeing this, and discovering that each ICC-ID was connected to an iPad 3G user email address, hackers wrote a script termed the “iPad 3G Account Slurper”and deployed itagainst AT&T’s servers.  The Account Slurper attacked AT&T’s servers for several days in early June 2010, andwas designed to harvest as many ICC-ID/e-mail address pairings as possible.  It worked bymimicking the behavior of an iPad 3G so that AT&T’s servers would be fooled into granting the Account Slurper access.  Once deployed, the Account Slurper used a process known as a “bruteforce” attack – an iterative process used to obtain information from a computer system – againstthe servers, randomly guessing at ranges of ICC-IDs.  An incorrect guess was met with noadditional information, while a correct guess was rewarded with an ICC-ID/e-mail pairing for aspecific, identifiable iPad 3G user.From June 5 through June 9, 2010, the Account Slurper stole for its hacker-authorsapproximately 120,000 ICC-ID/e-mail address pairings for iPad 3G customers. Immediately following the theft, the hacker-authors of the Account Slurper provided thestolen e-mail addresses and ICC-IDs to the website Gawker, which published the stoleninformation in redacted form, along with an article concerning the breach.  The article indicatedthat the breach “exposed the most exclusive email list on the planet,”and named a number offamous individuals whose emails had been compromised, including Diane Sawyer, HarveyWeinstein, Mayor Michael Bloomberg, and Rahm Emanuel.  The article also stated that iPadusers could be vulnerable to spam marketing and malicious hacking.  A group calling itself“Goatse Security” was identified as obtaining the subscriber data.According to its website, Goatse Security is a loose association of Internet hackers andself-professed Internet “trolls” – people who intentionally, and without authorization, disruptservices and content on the Internet – to which both Spitler and Auernheimer belong. Auernheimer previously has been outspoken about his trolling activities, bragging to The NewYork Times in August 2008: “I hack, I ruin, I make piles of money.”  Auernheimer has also madeInternet video postings taking credit for trolling Amazon.com and causing a “one billion dollarchange in their market capitalization.”      During the data breach, Spitler and Auernheimer communicated with one another usingInternet Relay Chat, an Internet instant messaging program.  Those chats not only demonstratethat Spitler and Auernheimer were responsible for the data breach, but also that they conductedthe breach to simultaneously damage AT&T and promote themselves and Goatse Security.  Asthe data breach continued, so too did the discussions between Spitler, Auernheimer, and otherGoatse Security members about the best way to take advantage of the breach and associated theft. On June 10, 2010, immediately after going public with the breach, Spitler and Auernheimerdiscussed destroying evidence of their crime.U.S. Attorney Fishman stated: “Hacking is not a competitive sport, and security breachesare not a game.  Companies that are hacked can suffer significant losses, and their customersmade vulnerable to other crimes, privacy violations, and unwanted contact.  Computer intrusions-2-and the spread of malicious code are a threat to national security, corporate security, and personalsecurity.  Those who use technological expertise for malicious purposes take note: your activitiesin cyberspace can have serious consequences for you in the real world.”“One primary principle of our society is confidence in a reasonable expectation ofpersonal privacy, which includes expectations of financial privacy, medical privacy, and privacyin our communications,” said Michael B. Ward, Special Agent in Charge of the FBI’s Newarkfield office.  “Unauthorized intrusions into personal privacy adversely affect individual citizens,businesses, and even national security.  Such intrusion cases, regardless if the motive is criminalgain or prestige among peers in the cyber-hacking world, must and will be aggressively pursuedto ensure these rights are protected to the highest degree.”Each defendant is charged with one count of conspiracy to access a computer withoutauthorization and one count of fraud in connection with personal information.  Each count withwhich the defendants are charged carries a maximum potential penalty of five years in prison anda fine of $250,000.U.S. Attorney Fishman credited special agents of the FBI, under the direction of SpecialAgent in Charge Michael B. Ward in Newark, with the investigation leading to the charges.  Healso thanked special agents of the FBI, under the direction of Special Agent in Charge ValerieParlave in Little Rock, Ark., and the U.S. Attorney’s Office for the Western District of Arkansas,under the direction of U.S. Attorney William Conner Eldridge.The government is represented by Assistant United States Attorneys Lee Vartan and ZachIntrater of the Computer Hacking and Intellectual Property Section of the United StatesAttorney’s Office Economic Crimes Unit.The charges and allegations contained in the Complaint are merely accusations, and eachdefendant is presumed innocent unless and until proven guilty.  11-025 ###Defense counsel:Spitler: Susan C. Cassell, Esq., Ridgewood, N.J.Auernheimer: Candace Hom, Esq., Federal Public Defender, Newark-3-

17Jan/110

EDO Lahore Suspended